Wireless Personal Communications

, Volume 109, Issue 2, pp 739–760 | Cite as

MTPKM: Multipart Trust Based Public Key Management Technique to Reduce Security Vulnerability in Mobile Ad-Hoc Networks

  • Y. Harold RobinsonEmail author
  • E. Golden Julie


A mobile ad hoc network (MANET) is a collection of self-configured movable nodes. Keys have to be securely handled and maintained and there are various techniques available in MANET for efficient key generation and distribution. Trying to keep the keys always protected during transmission is a difficult issue. A multipart trust based public key management (MTPKM) is intended to gather a requisite stage of security, in addition to convene better output necessities like service accessibility and message overhead exclusive of communication on known certificate authority. An optimal trust threshold is associated with all the nodes to reduce security vulnerabilities like the public key compromise and key leakage. MTPKM does not support trusted the third party hence it finds the most trusted neighbor node which satisfies the trust threshold condition to certifying the key generated. In turn, the neighbor node again ensures the confidence of the node which is requesting to certify the public key. The requesting node and certificate issuer node must exhibit a mutual trust relationship. The proposed trust-based scheme is simulated and the performance is evaluated. It is observed that the proposed scheme surpasses other trust-based models in terms of availability and security vulnerability.


MANET Key management Security vulnerability Certificate authority and trust 



  1. 1.
    Harold Robinson, Y., & Rajaram, M. (2016). A memory aided broadcast mechanism with fuzzy classification on a device-to-device mobile Ad Hoc network. Wireless Personal Communications. Scholar
  2. 2.
    Balaji, S., & Rajaram, M. (2016). SIPTAN: Securing inimitable and plundering track for ad hoc network. Wireless Personal Communications, 9, 1–21. Scholar
  3. 3.
    Cho, J.-H., et al. (2016). Trust threshold based public key management in mobile ad hoc networks. Ad Hoc Networks. Scholar
  4. 4.
    Luo, H., & Lu, S. (2004). URSA: ubiquitous and robust access control for mobile ad hoc networks. IEEE/ACM Transactions on Networking, 12, 1049–1063.CrossRefGoogle Scholar
  5. 5.
    Capkun, S., Buttyan, L., & Pierre, J. (2003). Self-organized public-key management for mobile ad hoc networks. IEEE Transaction on Mobile Computing, 2, 1233–1536.CrossRefGoogle Scholar
  6. 6.
    Yi, S., Naldurg, P., & Kravets, R. (2001). Security-aware ad hoc routing for wireless networks. In MobiHoc (pp. 299–302).Google Scholar
  7. 7.
    Kapil, A., & Rana, S. (2008). Identity-based key management in MANETs using public key cryptography. International Journal of Security, 3, 1–6.Google Scholar
  8. 8.
    Xoing, W., & Gong, Y. H. (2011). Secure and highly efficient three level key management scheme for MANET. WSEAS Transactions on Computers, 10(10), 6–15.Google Scholar
  9. 9.
    Van der Merwe, J., Dawoud, D., & McDonald, S. (2004). Trustworthy key management for mobile ad hoc networks. In Proceedings southern African telecommunication networks and applications conference (SATNAC). Google Scholar
  10. 10.
    Sahadevaiah, K., & Ramanaiah, O. B. V. (2008). Self-organized public-key cryptography for mobile ad hoc networks. IEICE Transactions on Communications, E91–B(11), 3574–3583.Google Scholar
  11. 11.
    Tamboli, A. S., Shinde, S. S., & Tamboli, S. S. (2011). Simulation of self-organized public-key management for ad hoc networks. IJCA Special Issue on Network Security and Cryptography (NSC).Google Scholar
  12. 12.
    Maity, S., & Hansdah, R. C. (2014). Self-organized public key management in MANETs with enhanced security and without certificate-chains. Computer Networks, 65, 183–211.CrossRefGoogle Scholar
  13. 13.
    Lehane, B., & Doyle, L. (2006). Shared RSA key generation in a mobile ad hoc network. IEEE Transactions on Mobile Computing, 5, 43–51.CrossRefGoogle Scholar
  14. 14.
    John, S. P., & Samuel, P. (2015). Self-organized key management with trusted certificate exchange in MANET. Ain Shams Engineering Journal, 6(1), 161–170.CrossRefGoogle Scholar
  15. 15.
    Chauhan, K. K., & Tapaswe, S. (2010). A secure key management system in group structured mobile ad hoc networks. In IEEE international conference on wireless communications, networking and information security (pp. 307–311).Google Scholar
  16. 16.
    Huang, H., & Wu, S.F. (2003). An approach to certificate path discovery in mobile ad hoc networks. In 1st ACM workshop on security of ad hoc and sensor networks.Google Scholar
  17. 17.
    Huang, J., & Nicol, D. (2009). A calculus of trust and its application to PKI and identity management. In ACM 8th symposium on identity and trust on the internet. Google Scholar
  18. 18.
    Meng, X., & Li, Y. (2012). Verifiable dynamic threshold key management scheme based on bilinear pairing without a trusted party in mobile ad hoc network. In IEEE international conference on automation and logistics (Vol. 2, pp. 673–689).Google Scholar
  19. 19.
    Shamir, A. (2007). Threshold cryptography based on sharing of secrets. In ACM symposium on identity and trust on the internet (pp. 612–613).Google Scholar
  20. 20.
    Zhang, Y., Liu, W., Fang, Y., & Kwon, Y. (2005). AC-PKI: Anonymous and certificateless public-key infrastructure for mobile ad hoc networks. In: IEEE international conference on communications (ICC’05) (Vol. 25, pp. 3515–3519).Google Scholar
  21. 21.
    Al-Riyami, S., & Paterson, K. G. (2003). Certificateless public key cryptography. In International conference on the theory and application of cryptology and information security (Vol. 2894, pp. 452–473).Google Scholar
  22. 22.
    Harold Robinson, Y., Balaji, S., & Golden Julie, E. (2018). Design of a buffer enabled ad hoc on-demand multipath distance vector routing protocol for improving throughput in mobile ad hoc networks. Wireless Personal Communications. Scholar
  23. 23.
    Rana, S., & Kapil, A. (2001). Identity-based and threshold key management in mobile ad hoc networks. In Proceeding of ACM symposium on MANET (pp. 146–155).Google Scholar
  24. 24.
    Sun, H., Zheng, X., & Deng, Z. (2009). An identity-based and threshold key management scheme for ad hoc networks. In International conference on networks security and wireless communications and trusted computing (pp. 520–523).Google Scholar
  25. 25.
    Dahshan, H., Elsayed, F., Rohiem, A., Elmoghazy, A., & Irvin, J. (2008). A trust based threshold revocation scheme for MANET. IEEE MASS, 2008, 130–137.Google Scholar
  26. 26.
    Cho, J. H., Swami, A., & Chen, I. R. (2010). Modeling and analysis of trust management with trust chain optimization in mobile ad hoc networks. Journal of Network and Computer Applications, 35, 1001–1012.CrossRefGoogle Scholar
  27. 27.
    Harold Robinson, Y. & Golden Julie, E. (2019). SMR: A synchronized multipath rebroadcasting mechanism for improving the quality of conversational video service. Wireless Personal Communications, 104(3), 1149–1173.CrossRefGoogle Scholar
  28. 28.
    Dahshan, H., & Irvine, J. (2009). Key management in web of trust for mobile ad hoc networks. In International conference on advanced information networking and applications (Vol. 13, pp. 24–30).Google Scholar
  29. 29.
    Chang, M. J., Cho, J.‐H., Chen, I.‐R., Chan, K. S., & Swami, A. (2012). Trust‐based task assignment in military tactical networks. In 17th international command & control research & technology symposium (ICCRTS).Google Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2019

Authors and Affiliations

  1. 1.Department of Computer Science and EngineeringSCAD College of Engineering and TechnologyTirunelveliIndia
  2. 2.Department of Computer Science and EngineeringAnna University Regional CampusTirunelveliIndia

Personalised recommendations